References
Last updated
Last updated
Here’s a consolidated list of resources, guides, and cheat sheets to assist security professionals in understanding and exploiting Windows privilege escalation techniques. Each resource provides detailed methodologies and tools for different aspects of privilege escalation.
Microsoft Documentation on icacls
Learn how to modify and view Access Control Lists (ACLs) on Windows systems.
Privilege Escalation Windows - Philip Linghammar Comprehensive coverage of Windows privilege escalation techniques. (Placeholder, ensure you access it from a reputable source)
Windows Elevation of Privileges - Guifre Ruiz Detailed examination of privilege escalation techniques used in Windows environments. (Placeholder)
The Open Source Windows Privilege Escalation Cheat Sheet by amAK.xyz and @xxByte Community-driven cheat sheet consolidating numerous techniques.
Windows Privilege Escalation Fundamentals Essential concepts and strategies in Windows privilege escalation.
TOP 10 Ways to Boost Your Privileges in Windows Systems - Hackmag A concise article outlining effective privilege escalation techniques.
Windows Privilege Escalation Guide - Absolomb's Security Blog Comprehensive guide covering various privilege escalation scenarios.
Abusing DiagHub - xct Exploits the Microsoft Diagnostics Hub for privilege escalation.
Weaponizing Privileged File Writes with the USO Service - itm4n Exploits Windows Update Service for file write vulnerabilities.
Abusing SeLoadDriverPrivilege
for Privilege Escalation - Oscar Mallo
Discusses exploiting driver loading privileges for EoP.
Abusing Arbitrary File Deletes to Escalate Privilege - Simon Zuckerbraun Explores privilege escalation through file deletion vulnerabilities.
Giving JuicyPotato a Second Chance: JuicyPotatoNG Updates and new methods for using JuicyPotato for EoP.
Hacking Trick: Environment Variable $Path
Interception
Techniques involving environment variable manipulation for EoP.
A series of detailed posts covering different privilege escalation techniques:
WPE-01: Stored Credentials
WPE-02: Windows Kernel
WPE-03: DLL Injection
WPE-04: Weak Service Permissions
WPE-05: DLL Hijacking
WPE-06: Hot Potato
WPE-07: Group Policy Preferences
WPE-08: Unquoted Service Path
WPE-09: Always Install Elevated
WPE-10: Token Manipulation
WPE-11: Secondary Logon Handle
WPE-12: Insecure Registry Permissions
WPE-13: Intel SYSRET
These resources provide a comprehensive knowledge base for understanding and exploiting privilege escalation in Windows systems. They are invaluable for penetration testers, red teamers, and security professionals aiming to identify and mitigate privilege escalation vulnerabilities.
Local Privilege Escalation Workshop - @sagishahar A presentation covering techniques and strategies for local privilege escalation. (Placeholder)
Windows Exploitation Tricks - James Forshaw, Project Zero Techniques for exploiting file writes and other vulnerabilities.
Alternative Methods of Becoming SYSTEM - Adam Chester Unconventional techniques for achieving SYSTEM privileges.
LOLBAS Project: Catalogs Microsoft-signed binaries and scripts that can be abused for unintended actions.